Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I, IMECS 2014, March 12 - 14, 2014, Hong Kong
A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture Abdulsalam Ya’u Gital, Abdul Samad Ismail, Min Chen, and Haruna Chiroma, Member, IAENG Abstract— Collaborative Virtual Environment (CVE) provides opportunity for users in a distant location to share and access Information and Communication Technology resources. In this paper, we propose the design of architectural framework of CVE based on cloud computing based paradigm in order to improve the effectiveness of the conventional CVE. The propose cloud based CVE was able to improve the effectiveness of the conventional CVE by allowing more access to ICT resources in a cost effective way than the Conventional CVE. Our proposal with minor modification can be applied to educational purposes, and distribution of government responsibilities to agencies. Index Terms— Cloud Computing, Collaborative Virtual Environment, Infrastructure as a Service, Platform as a Service, Software as a Service.
I. INTRODUCTION
C
ollaborative Virtual Environment (CVE) allows participant from distant geographic location to share a common virtual environment, including virtual entities and resources maintained by a group of computers. In such a way that it can support effective communication among the users to achieve synergistic coordination of tasks [1-3]. Applications of CVEs include Education, massively multiplayer online games (e.g., World of Warcraft), virtual worlds (e.g., Second Life), military training, industrial remote training, and collaborative engineering [4-7]. As the number of concurrent participants is becoming larger, the CVE systems may no longer provide the level of consistency and scalability required, typically in terms of response time [1, 7, 8]. [1] proposes a dynamic clustering algorithm for partitioning the virtual environment with variable number of region servers. The algorithm calculates the most reasonable number of regions by tracking the number of users in the system. At the initial state of the system, one region server manages all cells in the different world. When the main server that monitors the load of the system periodically find the server approaching its capacity limit, the dynamic clustering algorithm is executed to partition the virtual environment, whereas another program is busy configuring a new server to handle excess load. Each time this algorithm is partitioning the virtual
A.Y. G. and A.S.I. (
[email protected]) are PhD research scholar and professor, respectively with the University of Technology Malaysia, Department of Computer Science, Johor Baru, Malaysia. Corresponding author (e-mail: asgital @ yahoo.com). M. C. is a professor with the Oxford e-Resource Center, University of Oxford, England, UK. (e-mail:
[email protected]). H. C. is a PhD research scholar with the University of Malaya, Kuala Lumpur, Malaysia (e-mail:
[email protected]).
ISBN: 978-988-19252-5-1 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)
environment, other program must be configuring new server to handle the new partition, executing another process for merging different regions to or executing steps for the region server to exit from the system and merge it cells to another region. This process may take much time to execute and consume a lot of computing and communication resources. With current issues of increasing simultaneous number of users in CVE, this is not really suitable for time dependent applications such as CVE. The new region server consumes much time as well as communication resources. This is because the amount of data required to be transferred from a particular region server to a new region server are voluminous. According to Forrester [9] end user organizations will continue to show strong interest in email and IM/presence services. This segment accounts for close to 14% of the total collaboration services market in 2011. Forrester estimates that the segment will grow by 10.6% through 2018, as organizations continue to migrate email systems from onpremises, self-managed models to host and cloud-based models. Therefore, we propose the design of a cloud based CVE to improve its effeteness. The rest of the paper is organized as follows: section II describes an overview of CC. Section III presents the description of the major benefits of CC. Section IV covers a brief explanation on CC architecture. Section V presents the propose a framework and potential benefits in Section VI before concluding remarks in Section VII. II. BASIC THEORY OF CLOUD COMPUTING The CC is a new paradigm to organize and manage Information Technology (IT) resources. There are various definitions of CC, one of which is the definition according to The National Institute of Standards and Technology (NIST) which defines CC as “model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction” [10]. Generally speaking, the CC service model consists of three layers: Infrastructure as a service (IaaS), Platform as a service (PaaS), Software as a Service (SaaS) [11]. The cloud computing service model is depicted in Fig 1. A. Infrastructure as a Service Infrastructure layer corresponds to IaaS infrastructure services, is the lowest layer of the network. Users can household provide standard services, including computing power and storage resources. It turns the memory, storage and computing power into a virtual resource pool for the
IMECS 2014
Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I, IMECS 2014, March 12 - 14, 2014, Hong Kong
entire industry to provide the required computing power and storage resources[10, 12-14]. B. Platform as a Service The platform layer corresponds to the PaaS that create a higher level of abstraction on the IaaS layer to provide a development environment, test environment, server platforms, and other services. Users can develop applications based on the Internet, and other server service provider's infrastructure and subsequently, sharing it to other users[10, 12, 14]. C. Software as a Service SaaS is a software distribution model designed for web delivery, user can deploy and access through the Internet. SaaS providers need to build information for all network infrastructure, software, hardware, operating platform, and is responsible for the implementation of all postmaintenance and other services. Compared with the traditional method of service, SaaS (refer to Figure 1) not only reduces the cost of traditional software licensing, and vendors deploy application software on a unified server, eliminating the end-user's server hardware, network security devices and software upgrade and maintenance expenses, the customer does not need other IT investment in addition to personal computers and Internet connections to obtain the required software and services [10, 12, 14].
III. BENEFIT OF CLOUD COMPUTING Clouds offer a new level of flexibility in application and data delivery. Provisioning applications and services from a cloud can give you the operational benefits without the capital expenses of maintaining on premises environments as pointed out in the CISCO official website. Cloud technology can provide significant benefits such as cost effectiveness, scalability, flexibility, agility, other benefits can be found in [13]. Outline the benefits that can be generated using CC technology. In the previous section, the CVE requirement was listed and described. To clearly show how the cloud features benefit in satisfying the requirement of CVE, it is necessary to match these requirements.
IV. CLOUD COMPUTING ARCHITECTURE A. Cloud Computing Architecture Generally speaking, the architecture of a CC environment can be divided into 4 layers: the hardware/datacenter layer, the infrastructure layer, the platform layer and the application layer, as shown in Fig 2.[10]. B. The Hardware Layer This layer is responsible for managing the physical resources of the cloud, including physical servers, routers, switches, power and cooling systems. In practice, the hardware layer is typically implemented in data centers. A data center usually contains thousands of servers that are organized in racks and interconnected through switches, routers or other fabrics. Typical issues at hardware layer include hardware configuration, fault tolerance, traffic management, power and cooling resources management. C. The Infrastructure Layer
Fig 1. Service model of cloud computing
ISBN: 978-988-19252-5-1 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)
Also refer to as the Virtualization layer, the infrastructure layer creates a pool of storage and computing resources by partitioning the physical resources using Virtualization technologies. The infrastructure layer is an essential component of the CC, since many key features, such as dynamic resource assignment, are only made available through Virtualization technologies.
IMECS 2014
Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I, IMECS 2014, March 12 - 14, 2014, Hong Kong
Fig 2. Cloud computing architecture
D. The Platform Layer Built on top of the infrastructure layer, the platform layer consists of operating systems and application frameworks. The purpose of the platform layer is to minimize the burden of deploying applications directly into VM containers. For example, Google App Engine operates at the platform layer to provide API support for implementing storage, database and business logic of typical web applications. E. The Application Layer At the highest level of the hierarchy, the application layer consists of the actual cloud applications. Different from traditional applications, cloud applications can leverage the automatic-scaling feature to achieve better performance, availability and lower operating cost. Compared to traditional service hosting environments such as dedicated server farms, the architecture of CC is more modular. Each layer is loosely coupled with the layers above and below, allowing each layer to evolve separately. This is similar to the design of the OSI model for network protocols. The architectural modularity allows CC to support a wide range of application requirements while reducing management and maintenance overhead. V. PROPOSE FRAMEWORK OF THE CLOUD BASED COLLABORATIVE VIRTUAL ENVIRONMENT The architecture of the cloud based CVE is proposed by the modification of previous CVE. The CVE moves into the cloud instead of the conventional environment presently in used. Fig 3 present the propose design of the cloud based CVE which comprised of the following components: virtual world, The first component which is the cloud infrastructure. This layer represents the hardware layer that is used as the Virtual Collaboration and software visualization technology, which maintain the reliability and ISBN: 978-988-19252-5-1 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)
stability of the infrastructures. It enables the provision of networking components, servers, storage, routers, and switches. The CC infrastructure heavily influences application performance and throughput in a distributed computing environment[10]. It is responsible for hosting and given supportive coordination to infrastructures including the platform of cloud, repositories, computers, servers, network communication devices, storage units among other physical structures like building. The resources of the information and communication technology are distributed by the cloud infrastructure. The cloud platform provides both services and inters connections among the systems on the platforms as well as to provide an easy way for the system's hardware to operate just like the internet. Furthermore, the cloud infrastructure allowed the hardware to securely access data in a sharable platform. Operating systems and other applications software that provides support for the smooth operations of the application layer are run and utilized in the application layer. In this manner, the both the hardware component and computing resources are properly managed and pave a way for smooth operations without hitches. In this architecture we added Session Information Services (SIaaS): Similar to the operation of other applications, this module is concerned about the functions to change and save session information, such as session initiation, session logs, and client join/leave. User Information Services (UIaaS): In CVE each user is represented by an avatar, this module manages the avatar of the user. User Communication Services: The module handles all the three types of communication channel, including video, audio, and text. With the cloud provision of SaaS and IaaS, all this communication is realized. In the traditional architecture, video communication seems to be difficult due to insufficient bandwidth in a WAN. The CVE cloud based architecture proposed in this paper can make devices and resources readily available to users in a cost effective manner. This proposal is of interest since its implementation can increase scalability, reduce access time and provide more access to resources. IMECS 2014
Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I, IMECS 2014, March 12 - 14, 2014, Hong Kong
Fig 3. The Conventional CVE Architecture towards a Cloud based CVE
VI. POTENTIAL BENEFITS OF THE PROPOSE CLOUD BASED CVE ARCHITECTURE The potential benefits to be derived from the propose framework are as follows: sharing and access to ICT resources will be easier than in the conventional CVE since high computation power can be increased. Users can now determine their storage capacity depending on their respective needs. Having access to the ICT resources can be at any time and anywhere. The cost of implementing cloud based CVE is more effective than the conventional CVE.
ISBN: 978-988-19252-5-1 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)
Architecture
VII. CONCLUSIONS In this paper, discussion of the cloud computing, including benefits and architectural model is presented. The design of a CVE based on the CC is proposed in our research. The framework comprised of cloud infrastructure layer, user layer, application layer, virtual world and access points. The potential benefits of the propose cloud based CVE is unveiled and it was found to have more potential benefits than the conventional CVE currently utilized by users. The complete implementation of our design can effectively improve the performance of the conventional CVE. Therefore, we plan to further this research by implementing this design in a control environment and observed the behavior of the two models (conventional CVE and the cloud based CVE).
IMECS 2014
Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I, IMECS 2014, March 12 - 14, 2014, Hong Kong
REFERENCES [1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9] [10]
[11]
[12]
[13]
[14]
X. Hu, L. Liu, and T. Yu, "A hierarchical architecture for improving scalability and consistency in CVE systems," International Journal of Parallel, Emergent and Distributed Systems, vol. 26, pp. 179-205, 2011. X. M. Hu, H. X. Cai, and T. Yu, "A Self-Adaptive Filtering Algorithm Based on Consistency QoS in CVE Systems," Advanced Materials Research, vol. 225, pp. 301-306, 2011. W. Shao-Qing, C. Ling, and C. Gen-Cai, "A framework for Java 3D based collaborative virtual environment," in Computer Supported Cooperative Work in Design, 2004. Proceedings. The 8th International Conference on, 2004, pp. 34-39. S. Benford, C. Greenhalgh, T. Rodden, and J. Pycock, "Collaborative virtual environments," Communications of the ACM, vol. 44, pp. 79-85, 2001. C. Greenhalgh and S. Benford, "MASSIVE: a collaborative virtual environment for teleconferencing," ACM Transactions on Computer-Human Interaction (TOCHI), vol. 2, pp. 239-261, 1995. A. S. Haji-Ismail, M. Chen, and P. W. Grant, "JACIE–an authoring language for WWW-based collaborative applications," Annals of Software Engineering, vol. 12, pp. 47-75, 1999. A. Y. Gital, A. S. bn Ismail, and S. Subramaniam, "On consistency and security issues in collaborative virtual environment systems," International Journal of Physical Sciences, vol. 8, pp. 1646-1654, 2013. Y. Deng and R. W. Lau, "On Delay Adjustment for Dynamic Load Balancing in Distributed Virtual Environments," Visualization and Computer Graphics, IEEE Transactions on, vol. 18, pp. 529-537, 2012. F. Consulting, "Collaboration Services: Deployment Options For The Enterprise," CISCO Systems2013. Q. Zhang, L. Cheng, and R. Boutaba, "Cloud computing: state-of-the-art and research challenges," Journal of Internet Services and Applications, vol. 1, pp. 7-18, 2010. A. Y. Gital and F. U. Zambuk, "Cloud Computing: Solution to ICT in Higher Education in Nigeria," Advances in Applied Science Research. 2011, vol. 2 (6). pp. 364-369.. D. Madan, A. Pant, S. Kumar, and A. Arora, "E-learning based on Cloud Computing," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, 2012. M. Carroll, A. Van der Merwe, and P. Kotze, "Secure cloud computing: Benefits, risks and controls," in Information Security South Africa (ISSA), 2011, 2011, pp. 1-9. N. Selviandro and Z. A. Hasibuan, "Cloud-Based e-learning: a proposed model and benefits by using e-learning based on cloud computing for educational institution," in Information and Communicatiaon Technology, ed: Springer, 2013, pp. 192-201.
ISBN: 978-988-19252-5-1 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)
IMECS 2014